Securing VoIP

Securing VoIP

4.11 - 1251 ratings - Source

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your companya€™s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. Explains the business case for securing VoIP Systems Presents hands-on tools that show how to defend a VoIP network against attack. Provides detailed case studies and real world examples drawn from the authorsa€™ consulting practice. Discusses the pros and cons of implementing VoIP and why it may not be right for everyone. Covers the security policies and procedures that need to be in place to keep VoIP communications safe.SCEP applies to the VPN operation or to standard enterprise network operation. ... CA to securely transport key information and digital certificates to network devices, such as the Avaya 9600 IP telephone and Cisco Adaptive Security Appliance. ... This eliminates the need for a user to manually launch a VPN client to secure communications. ... With BYOD comes a wide variety of smartphones and tablets.

Title:Securing VoIP
Author:Regis J. Jr (Bud) Bates
Publisher:Elsevier - 2014-11-14


You Must CONTINUE and create a free account to access unlimited downloads & streaming